Network

Security Team – Our Security Team is on call 24x7x365 to respond to security alerts and events.

Protection – Our network is protected by multiple layers of firewalls, best-in-class router technology, secure HTTPS transport over public networks, regular audits, and network intrusion detection/prevention technologies (IDS/IPS) that monitor and block malicious traffic and network attacks.

Architecture – Our network security architecture consists of multiple security zones of trust. More sensitive systems, like our database servers, are protected in our most trusted zones. Other systems are housed in zones commensurate with their sensitivity, depending on function, information classification, and risk. Depending on the zone, additional security monitoring and access controls will apply. DMZs are utilized between the Internet, and internally, between the different zones of trust.

Network Vulnerability Scanning – Network security scanning gives us deep insight for quick identification of out-of-compliance or potentially vulnerable systems.

Incident Management System – A incident management system gathers extensive logs from important network devices and hosts systems. The Security team is immediately notified with the event details. The Security team responds to these events.

Intrusion Detection and Prevention – Major application data flow ingress and egress points are monitored with Intrusion Detection Systems (IDS) or Intrusion Prevention Systems (IPS). The systems are configured to generate alerts when incidents and values exceed predetermined thresholds and uses regularly updated signatures based on new threats. This includes 24x7x365 system monitoring.

Risk Management Assessment and Procedures – WorkMax participates in frequent risk management assessments.  As a team, we will determine any potiential risks, and take the appropriate action to mitigate the risk.

DDoS Mitigation – WorkMax understands the importance of being protect from Distributed Denial of Service (DDoS) attacks.  We have multiple systems in place to mitigate Distributed Denial of Service (DDoS) attacks.

Logical Access – Access to the WorkMax Production Network is restricted by an explicit need-to-know basis, utilizes least privilege, is frequently audited and monitored, and is controlled by our Operations Team. Employees accessing the WorkMax Production Network are required to use multiple factors of authentication.

Security Incident Response – In case of a system alert, events are escalated to the appropriate team, 24x7x365. Our employees are trained on security incident procedures, including the correct communication avenue to resolve all issues most efficiently.